2.
of this study is to build a Hadoop cloud computing [9]. In environment for Python or Java, an Eclipse IDE [13] isorder to verify the cloud system effectiveness and efficiency applied to develop the application program (AP) at local sitein access security, the fingerprint identification and face as shown in Fig. 6. It is noted that please remember to installrecognition by using rapid identification have achieved in Java JDK [14] before you setup an Eclipse IDE in local site.this study. If AP has been done and is waiting for dispatch on Hadoop In many applications, embedded devices often require cloud computing server, we deploy this AP via the path ofhuge computing power and storage space, just the opposite LAN or WiFi. Finally, as shown in Fig. 7, we take a look atof the hardware of embedded devices. Thus the only way to HBase in Hadoop server to make sure that the cloudachieve this goal is that it must be structured in the "cloud computing is ready for the task.computing" and operated in "cloud services". The idea ishow to use the limited resources of embedded devices to B. Establishing Thin Clientachieve the "cloud computing", in addition to using the In terms of thin client, JamVM is treated as thewired Ethernet connection, and further use of wireless framework of programming development; however themobile devices IEEE802.3b / g or 3G to connect, as shown virtual machine JamVM has no way to perform the drawingin Fig. 1. even through their core directly, and thus it must call other First, we use the standard J2ME [10] environment for graphics library to achieve the drawing performance. Hereembedded devices, where JamVM [11] virtual machine is some options we have are available, for example,employed to achieve J2ME environment and GNU GTK+DirectFB, GTK+X11, QT/Embedded, and so on, asClasspath [12] is used as the Java Class Libraries. In order to shown in Figs. 8, 9, and 10 below. The problem wereduce the amount of data transmission, the acquisition of encountered is that GTK needs a few packages to workinformation processed is done slightly at the front-end together required many steps for installation, compilingembedded devices and then processed data through the different packages to build system is also difficult, and it isnetwork is uploaded to the back-end, private small-cloud often time-consuming for the integration of a few packagescomputing. After the processing at the back-end is no guarantee to complete the work. Therefore this study hascompleted, the results sent back to the front-end embedded chosen QT/Embedded framework instead of GTK series, indevices. As shown in Fig.2, an open source Hadoop such a way that achieves GUI interface functions. In Fig. 11,packages is utilized to establish the private cloud computing no matter SWT or AWT in JamVM they apply Java Nativeeasily; in such a way that we can focus on installing the Interface (JNI) to communicate C- written graphics library.back-end cluster controllers and cloud controller in order to Afterward QT/Embedded gets through the kernel driver tobuild a private small-cloud computing. achieve graphic function as shown in Fig. 12. According to An embedded platform in conjunction with a cloud the pictures shown in Fig. 11 and Fig. 12, we can stringcomputing environment is applied to testing the capabilities them together to be the structure of a node device as shownof fingerprint identification and facial recognition as the in Fig. 10. This part will adopt a low-cost, low-poweraccess security system. The basic structure of Hadoop cloud embedded platform to realize a thin client.computing is developed and has been deployed as well. We C. Installing Access Security Systemwill then test the performance of the embedded platformoperating in cloud computing to check whether or not it can When establishing a Hadoop cloud computing is done,achieve immediate and effective response to required we will test the cloud employing an embedded platform in afunctions. Meanwhile, we continue to monitor the online cloud environment to perform fingerprint identification [15]operation and evaluate system performance in statistics, such and face recognition [16] to fulfill the access security systemas the number of files, file size, the total process of MB, the [17]. Meanwhile the development of basic structure andnumber of tasks on each node, and throughput. In a cluster deployment for Hadoop cloud computing are valid and evenimplementation of cloud computing, the statistical more we test the service performance for an embeddedassessment by the size of each node is listed. According to platform collaborated with cloud computing, checking anthe analysis of the results, we will adjust the system immediate and effective response to client. The accessfunctions if changes are required. security system is shown in Fig. 13. III. ACCESS SECURITY IN HADOOP IV. EXPERIMENTAL RESULTS AND DISCUSSIONS In order to verify the cloud system effectiveness andA. Deploying Hadoop Cloud Computing efficiency in access security, the experiment on fingerprint Once a Hadoop cloud computing server has been identification and face recognition by using rapidestablished in server site, we have to test the functionality of identification in Hadoop cloud computing has been donecloud computing in Hadoop system. As shown in Fig. 3, we successfully within 2.2 seconds in average accessfirst test the Hadoop Administration Interface at the website identification to exactly cross-examine the subject identity.http://hadoop1:50030. Next, Task Tracker Status at As a result the proposed Hadoop cloud computing has beenhttp://hadoop1:50060 will be examined as shown in Fig. 4. performed very well when it has deployed in local area.After that we move on to check Hadoop Distributed File Steps are as follows: (a) the operation for face recognition isSystem (HDFS) Status, as shown in Fig. 5, at quickly to open the video camera for the first, and then presshttp://hadoop1:50070. In order to setup a programming the capture button, the program will execute binarization 78